Руководство Пользователя для Cisco Cisco Email Security Appliance X1070
3-3
Cisco AsyncOS 9.0 for Email User Guide
Chapter 3 Setup and Installation
Installation Planning
Installation Scenarios
You can install your Email Security appliance into your existing network infrastructure in several ways.
Most customers’ network configurations are represented in the following scenarios. If your network
configuration varies significantly and you would like assistance planning an installation, please contact
Cisco Customer Support (see
configuration varies significantly and you would like assistance planning an installation, please contact
Cisco Customer Support (see
).
•
•
•
•
•
•
Configuration Overview
The following figure shows the typical placement of the Email Security appliance in an enterprise
network environment:
network environment:
In some scenarios, the Email Security appliance resides inside the network “DMZ,” in which case an
additional firewall sits between the Email Security appliance and the groupware server.
additional firewall sits between the Email Security appliance and the groupware server.
The following network scenarios are described:
•
Behind the Firewall: two listeners configuration (
)
Choose the configuration that best matches your infrastructure. Then proceed to the next section,
Incoming
•
Incoming mail is accepted for the local domains you specify.
•
All other domains are rejected.
•
External systems connect directly to the Email Security appliance to transmit email for the local
domains, and the Email Security appliance relays the mail to the appropriate groupware servers (for
example, Exchange™, Groupwise™, Domino™) via SMTP routes. (See
domains, and the Email Security appliance relays the mail to the appropriate groupware servers (for
example, Exchange™, Groupwise™, Domino™) via SMTP routes. (See
Outgoing
•
Outgoing mail sent by internal users is routed by the groupware server to the Email Security
appliance.
appliance.
•
The Email Security appliance accepts outbound email based on settings in the Host Access Table
for the private listener. (For more information, see
for the private listener. (For more information, see
.)